By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
The Tech MarketerThe Tech MarketerThe Tech Marketer
  • Home
  • Technology
  • Entertainment
    • Memes
    • Quiz
  • Marketing
  • Politics
  • Visionary Vault
    • Whitepaper
Reading: Data sprawl creates risk as personal app use in business continues to rise
Share
Notification Show More
Font ResizerAa
The Tech MarketerThe Tech Marketer
Font ResizerAa
  • Home
  • Technology
  • Entertainment
  • Marketing
  • Politics
  • Visionary Vault
  • Home
  • Technology
  • Entertainment
    • Memes
    • Quiz
  • Marketing
  • Politics
  • Visionary Vault
    • Whitepaper
Have an existing account? Sign In
Follow US
© The Tech Marketer. All Rights Reserved.
The Tech Marketer > Blog > Technology > Data sprawl creates risk as personal app use in business continues to rise
Technology

Data sprawl creates risk as personal app use in business continues to rise

Last updated:
4 years ago
Share
Data sprawl creates risk as personal app use in business continues to rise
SHARE

Cloud app use within organizations has continued to rise, already increasing 35% since the beginning of 2022, with an average company of 500-2,000 users uploading, creating, sharing, or storing data in 138 different apps, and using an average of 1,558 distinct cloud apps each month.

Contents
Oh hi there 👋It’s nice to meet you.Sign up to receive awesome content in your inbox, every week.

This is according to Netskope, a specialist in Security Service Edge (SSE) and Zero Trust, which has released new research detailing the proliferation of cloud apps used within businesses worldwide.

The ‘Netskope Cloud and Threat Report: Cloud Data Sprawl’ found that more than one in five (22%) users upload, create, share or store data in personal apps and personal instances, with Gmail, WhatsApp, Google Drive, Facebook, WeTransfer, and LinkedIn ranking as the most popular personal apps and instances.

A personal app, such as WhatsApp, is an app that only sees personal usage from personal accounts. A personal instance is a personal account of an app that is also managed by the organization. For example, someone’s personal Gmail account in an organization that uses Google Workspaces is a personal instance.

Additionally, highlighting a continued trend in insider risk, the report revealed that one in five users (20%) upload an unusually high amount of data to such personal locations during the 30 days before they leave an organization, marking an increase of 33% during the same time period last year.

Ray Canzanese, threat research director, Netskope Threat Labs, said: “Cloud apps have helped to increase productivity and enable hybrid work, but they have also caused an ever-increasing amount of data sprawl that puts sensitive data at risk.

“Personal apps and instances are particularly concerning since users maintain access to data stored in those instances even well after they leave an organization. Proactive security measures – especially policy controls that limit access to sensitive data to only authorized users and devices and prevent sensitive data from being uploaded to personal apps and personal instances – can help reduce the risks of loss or exposure of sensitive data.”

Additional key findings from the report include:

  • Personal app usage is lowest in Financial Services, highest in Retail: The Financial Services sector has the most success in limiting the flow of data into personal apps and instances, with less than one in 10 users (9.6%) doing so, whereas nearly four in 10 (39.1%) of users in the Retail sector upload data to personal apps and instances.
  • More users than ever are uploading, creating, sharing, or storing data in cloud apps: The percentage of users with data activity in cloud apps increased from 65% to 79% in the first five months of 2022, with Cloud Storage, Collaboration, and Webmail apps ranking as the top cloud app categories used within organizations.
  • Organizations use many apps with overlapping functionality: Of the 138 apps for which an organization with 500–2,000 users uploads, creates, shares, or stores data, there are on average four Webmail apps, seven Cloud Storage Apps, and 17 Collaboration apps. This overlap can lead to security issues, such as misconfigurations, policy drift, and inconsistent access policies.

“Organisations are usually surprised when they discover just how many overlapping apps they are using. Gaining this visibility is an important step to helping rein in cloud sprawl and reduce the risks it poses to sensitive data. Once you know how data is being accessed, you can begin enforcing policies that reduce data risks without compromising productivity. Data security and productivity don’t have to be a tradeoff,” concluded Canzanese.

The Netskope Cloud and Threat Spotlight are produced by Netskope Threat Labs, a team composed of the industry’s foremost cloud threat and malware researchers who discover and analyze the latest cloud threats affecting enterprises. Findings are based on anonymized usage data between January 1 through May 31, 2022, and relate to a subset of Netskope customers with prior authorization.

Oh hi there 👋
It’s nice to meet you.

Sign up to receive awesome content in your inbox, every week.

We don’t spam! Read our privacy policy for more info.

Check your inbox or spam folder to confirm your subscription.

You Might Also Like

Chevron Data Center Texas Tax Break: What Big Oil’s AI Power Plant Means for Schools, Communities, and the State’s $1.3 Billion Problem

TikTok Ad-Free Subscription UK: What It Costs, Who Gets It, and What It Actually Means

Musk vs OpenAI Trial: Brockman’s $30 Billion Stake, Mars Ambitions, and Chaos in the Courtroom

AWS Outage North Virginia 2026: 5 Alarming Facts About the Overheating Crisis

IREN Stock Surges After Nvidia Partnership Fuels 5GW AI Infrastructure Push

Share This Article
Facebook LinkedIn Email Copy Link Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Alibaba launches ‘Data-as-a-Service’ firm Lingyang Alibaba dispatches ‘Information as-a-Service’ firm Lingyang
Next Article 3i Infotech and CoreStack team up to boost multi-cloud digital transformation 3i Infotech and CoreStack collaborate to help multi-cloud computerized change
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest News

  • Govee’s new portable smart lamp is on sale for the first time 

    If you’ve always liked the idea of the Philips Hue Go portable lamp but couldn’t justify the $100+ price tag, Govee recently released a much cheaper alternative, the Govee Table Lamp Classic, and it’s already receiving its first discount. Right now, you can pick the rechargeable smart lamp up at Amazon for $63.99 ($16 off),

  • Palantir’s true believers are wearing this jacket

    In late April, Palantir - the software company that, in recent years, has perhaps become best known for its defense industry contracts and work with Immigration and Customs Enforcement - announced that it would be adding new products to its merch store. The latest offering was a cotton chore coat. At $239 and in bright

  • Apple brings encrypted RCS chats to iPhone

    Apple now lets you have encrypted RCS conversations with Android users through the Messages app on iOS. As part of iOS 26.5, which was released on Monday, Apple added support for end-to-end encrypted RCS messaging in beta, meaning that Apple and Google can't see your messages while they're sent. With iOS 26.5, you'll see a

  • Texas sues Netflix for advertising ‘bait and switch’ and spying

    Texas Attorney General Ken Paxton has filed a lawsuit against Netflix, accusing the company of turning its back on its promise to remain ad-free and safe for kids. The lawsuit, filed on Monday, claims Netflix has "opened Texans' data for inspection by the same Big Ad Tech community it once criticized for exploiting users in

  • Google stopped a zero-day hack that it says was developed with AI

    For the first time, Google says it has spotted and stopped a zero-day exploit developed with AI. According to a report from Google Threat Intelligence Group (GTIG), "prominent cyber crime threat actors" were planning to use the vulnerability for a "mass exploitation event" that would have allowed them to bypass two-factor authentication on an unnamed

- Advertisement -
about us

We influence 20 million users and is the number one business and technology news network on the planet.

Advertise

  • Advertise With Us
  • Newsletters
  • Partnerships
  • Brand Collaborations
  • Press Enquiries

Top Categories

  • Artificial Intelligence
  • Technology
  • Bussiness
  • Politics
  • Marketing
  • Science
  • Sports
  • White Paper

Legal

  • About Us
  • Contact Us
  • Privacy Policy
  • Affiliate Disclaimer
  • Legal

Find Us on Socials

The Tech MarketerThe Tech Marketer
© The Tech Marketer. All Rights Reserved.
Welcome Back!

Sign in to your account

Lost your password?